Nmedia - Fotolia

Problem solve Get help with specific problems with your technologies, process and projects.

Debunking the myths of authenticated vulnerability scans

When it comes to authenticated vulnerability scans, there are many misunderstandings about the technology that leave organizations wary. Security expert Kevin Beaver explains what to expect from your scans.

When it comes to authenticated vulnerability scanning, there are many misunderstandings that have been passed off as truths, leaving many organizations and individuals wary of the task at hand. In this podcast, information security expert Kevin Beaver aims to set the story straight.

For example, do you know the difference between vulnerability scanning and penetration testing? Did you know that there is a significant amount of planning that needs to be done in advance in order to improve (and ease) the authenticated vulnerability scanning process? Or that just because a vulnerability is found doesn't mean it is truly a vulnerability your organization should be worried about?

Listen into this exclusive podcast now to learn all nine myths, misconceptions and oversights about authenticated vulnerability scanning.

About the author:
Kevin Beaver is an information security consultant, writer, professional speaker and expert witness at Atlanta-based Principle Logic, LLC, and author of several books on information security, including the best-selling Hacking For Dummies. In addition, he's the creator of the Security On Wheels information security audio books and blog, providing security learning for IT professionals on the go. You can reach Kevin through his website www.principlelogic.com and follow him on Twitter at @kevinbeaver.

Next Steps

View SearchSecurity's handbook on vulnerability management programs

Learn how to hone an effective vulnerability management program

This was last published in August 2014

Dig Deeper on Risk assessments, metrics and frameworks